Cross-layer Security.

Internet of Things.

Enter the nascent era of Internet of Things (IoT) and wearable devices, where small embedded
devices loaded with sensors collect information from its surroundings, process it and relay it to remote
locations for further analysis. Albeit looking harmless, this nascent technologies raise security and privacy
concerns. Concentrating on the design flow of IoT devices, we discuss some common design practices and their
implications on security and privacy.

Proof-Carrying Code.

To protect computer systems from running untrusted software programs, various methods have
been proposed in software domain to validate the trustworthiness and genuineness of the delivered software
code. Most of these methods lay burden on users to verify the code while a new mechanism, proof-carrying code,
switches workload purely to software providers and provides a unique way to determine whether code from
potentially untrusted sources is safe to execute.